IBM Security for Z

Security for Z

Join this online user group to communicate across Z Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

Preparing for Post-Quantum Cryptography journey with IBM Z Crypto Discovery & Inventory

By Asha Shekharappa posted 12 days ago

  

As quantum computing advances at an unprecedented pace, the threat it poses to traditional cryptographic systems becomes increasingly urgent. Current encryption standards—like RSA and ECC—that secure global communications, financial transactions, and sensitive data could be rendered obsolete by quantum algorithms such as Shor’s, which can break them in polynomial time. According to a 2025 report by the Global Risk Institute, nearly 50% of cybersecurity experts believe quantum threats could compromise widely-used cryptography within the next 10 to 20 years.

Why IBM Z Crypto Discovery & Inventory?

IBM Z Crypto Discovery & Inventory (zCDI) is designed to help organizations uncover and understand the cryptographic elements within their Z infrastructure. By pulling together crypto-related insights from diverse data sources, it creates a unified and actionable inventory of these assets. This empowers teams to oversee and govern their cryptographic landscape more effectively. zCDI also supports regulatory compliance by maintaining a clear record of cryptographic usage, which can simplify audit processes. Additionally, it equips businesses to pinpoint potential security exposures and plan corrective actions—accelerating their preparedness for the shift to post-quantum cryptography.

Key Features and Benefits

·   The solution delivers comprehensive and actionable visibility into cryptographic usage across applications and enabling teams to identify vulnerabilities, understand deployment context, and prioritize remediation to improve security posture and response time.

·    The solution significantly reduces operational complexity by automating the processes, eliminating the need for multiple tools and manual intervention. This not only accelerates workflows but also minimises the risk of human error and cryptographic misconfiguration.

·     It reduces the risk of audit failure, simplifies the compliance audits by validating the cryptographic inventory with current and evolving industry standards and company policies.

Dashboard

Designed for Security Architects, Application Developers

A dashboard which provides complete crypto usage details in one place,

·       Configurable to fetch the crypto usage details for selected Sysplex/systems 

·       Configurable to evaluate the crypto data with respect to the standard policies provided

·       Can leverage the crypto usage to update the existing applications with quantum safe algorithm

Built for Post Quantum Cryptography (PQC) and Compliance

IBM Z Crypto Discovery & Inventory is designed to align with NIST and CNSA standards. The Crypto usage is evaluated with the below policies.

·       NIST SP 800-131A r2

·       NIST SP 800-131A r2 plus Quantum Safe

·       CNSA 1.0

·       CNSA 2.0

Learn More

Please refer to the documentation to learn more about IBM zCDI.

0 comments
58 views

Permalink